[Resource Topic] 2010/216: Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework

Welcome to the resource topic for 2010/216

Title:
Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework

Authors: Zheng Yuan, Xiaoqiu Ren

Abstract:

A new distinguishing attack on HMAC and NMAC based on a dedicated compression function framework H, proposed in ChinaCrypt2008, is first presented in this paper, which distinguish the HMAC/NMAC-H from HMAC/NMAC with a random function. The attack needs 2^{17} chosen messages and 223 queries, with a success rate of 0.873. Furthermore, according to distinguishing attack on SPMAC-H, a key recovery attack on the SPMAC-H is present, which recover all 256-bit key with 2^{17)chosen messages, 2^{19} queries, and (t+1)x8 times decrypting algorithms.

ePrint: https://eprint.iacr.org/2010/216

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .